Numerical Methods for Scientists and Engineers
Author: Richard W Hamming
For this inexpensive paperback edition of a groundbreaking classic, the author has extensively rearranged, rewritten and enlarged the material. Book is unique in its emphasis on the frequency approach and its use in the solution of problems. Contents include: Fundamentals and Algorithms; Polynomial Approximation — Classical Theory; Fourier Approximation — Modern Therory; Exponential Approximation.
Go to: Confederate Industry or Business Partnering for Continuous Improvement
All-in-One Security+ Certification Exam Guide
Author: Gregory B Whit
All-in-One is all you need! This authoritative reference offers complete coverage of all material on the Security+ certification exam. You’ll find exam objectives at the beginning of each chapter, helpful exam tips, end-of-chapter practice questions, and photographs and illustrations. The bonus CD-ROM contains a testing engine with questions found only on the CD. This comprehensive guide not only helps you pass this challenging exam, but will also serve as an invaluable on-the-job reference.
Table of Contents:
Acknowledgments | ||
Preface | ||
Introduction | ||
Pt. I | Authentication | 1 |
Ch. 1 | General Security Concepts | 3 |
Pt. II | Malware and Attacks | 27 |
Ch. 2 | Types of Attacks and Malicious Software | 29 |
Pt. III | Security in Transmissions | 59 |
Ch. 3 | Remote Access | 61 |
Ch. 4 | 89 | |
Ch. 5 | Web Components | 103 |
Ch. 6 | Wireless and Instant Messaging | 133 |
Pt. IV | Security for the Infrastructure | 153 |
Ch. 7 | Infrastructure Security | 155 |
Ch. 8 | Intrusion Detection Systems | 195 |
Ch. 9 | Security Baselines | 223 |
Pt. V | Cryptography and Applications | 277 |
Ch. 10 | Cryptography | 279 |
Ch. 11 | Public Key Infrastructure | 307 |
Ch. 12 | Standards and Protocols | 357 |
Pt. VI | Operational Security | 383 |
Ch. 13 | Operational/Organizational Security | 385 |
Ch. 14 | Disaster Recovery, Business Continuity, and Organizational Policies | 405 |
Pt. VII | Administrative Controls | 431 |
Ch. 15 | Security and Law | 433 |
Ch. 16 | Privilege Management | 447 |
Ch. 17 | Computer Forensics | 463 |
Ch. 18 | Risk Management | 477 |
Ch. 19 | Change Management | 495 |
Pt. VIII | Appendixes | 509 |
App. A: About the CD-ROM | 511 | |
App. B | OSI Model and Internet Protocols | 513 |
Glossary | 523 | |
Index | 537 |
No comments:
Post a Comment